共 31 条
- [1] Ali-Ozkan O., Ouda A., Key-Based Reversible Data Masking for Business Intelligence Healthcare Analytics Platforms, 2019 International Symposium on Networks, Computers and Communications(ISNCC), pp. 1-6, (2019)
- [2] Bojchevski A., Gunnemann S., Adversarial Attacks on Node Embeddings via Graph Poisoning, ICML, 97, pp. 695-704, (2019)
- [3] Borgs C., Chayes J., Cohn H., Et al., An Theory of Sparse Graph Convergence I: Limits, Sparse Random Graph Models, and Power Law Distributions, Transactions of the American Mathematical Society, 372, 5, pp. 3019-3062, (2019)
- [4] Cai H. Y., Zheng V. W., Chang K. C. C., A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications, IEEE Transactions on Knowledge and Data Engineering, 30, 9, pp. 1616-1637, (2018)
- [5] Chen J. Y., Lin X., Shi Z. Q., Et al., Link Prediction Adversarial Attack Via Iterative Gradient Attack, IEEE Transactions on Computational Social Systems, 7, 4, pp. 1081-1094, (2020)
- [6] Cuzzocrea A., Shahriar H., Data Masking Techniques for NoSQL Database Security: A Systematic Review, 2017 IEEE International Conference on Big Data, 2017, pp. 4467-4473, (2017)
- [7] Dai H.J., Li H., Tian T., Et al., Adversarial Attack on Graph Structured Data, ICML, 80, pp. 1123-1132, (2018)
- [8] Eikmeier N., Gleich D. F., Revisiting Power - Law Distributions in Spectra of Real-World Networks, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2017, pp. 817-826, (2017)
- [9] Gagula A. C., Santillan J. R., Integrating Geographic Information System, Remote Sensing Data, Field Surveys, and Hydraulic Simulations in Irrigation System Evaluation, Proceedings of the 2020 IEEE REGION 10 CONFERENCE (TENCON), pp. 626-630, (2020)
- [10] Hui Y.U., Wei Z., Xinnian M.A., A Reversible Decryption Model for Vector and Raster Integration Based on Trigonometric Function, Bulletin of Surveying and Map- ping, 10, pp. 89-94, (2017)